- •70 Protection of information unit 1 – computer crime
- •Vocabulary
- •Exercises
- •VI. Arrange the following in pairs of synonyms
- •VII. Grammar revision. Translate the sentences into Russian
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 2 – technical and legal protection of information
- •Vocabulary
- •Exercises
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 3 – information security
- •Vocabulary
- •Exercises
- •V. Give the derivatives of the words, translate them
- •VI. Arrange the following in pairs of synonyms
- •VII. Answer about the article Information security
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about information security Keys
- •Unit 4 – basic principles Key concepts
- •Confidentiality
- •Integrity
- •Availability
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •XIII. Tell your partner about basic principles of information security
- •Vocabulary
- •Exercises
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Say in one word (see the words below)
- •XI. Give English equivalents
- •Unit 6 – information security management
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 7 – controls
- •Administrative
- •Logical
- •Physical
- •Vocabulary
- •Exercises
- •V. Grammar revision. Translate the sentences into Russian
- •VI. Answer about controls
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about controls Keys
- •Unit 8 – security classification for information
- •Vocabulary
- •Exercises
- •V. Answer about the article
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 9 – access control
- •Vocabulary
- •Exercises
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 10 – authorization
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Translate into English
- •Unit 11 – criptography
- •Defense in depth
- •Conclusion
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 12 – 10 immutable laws of security, laws 1, 2
- •Vocabulary
- •Exercises
- •I. Read and translate the information using the vocabulary
- •II. Translate the verbs, give the three forms
- •III. Give Russian equivalents
- •IV. Arrange the following in pairs of synonyms
- •V. Answer about the article
- •VI. Insert the proper words (see the words below)
- •VII. Say in one word (see the words below)
- •VIII. Give English equivalents
- •Unit 13 – laws 3, 4
- •Vocabulary
- •Exercises
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 14 – laws 5, 6
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 15 – laws 7, 8
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •Unit 16 – laws 9, 10
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Test 1 (units 1 – 8)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Test 2 (units 9 – 16)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Keys (test 1)
Vocabulary
grant – разрешать
deny – отклонять
appropriately – должным образом
log on – входить (в систему)
as far as – поскольку, насколько
as well – тоже; с таким же успехом
sensitive – чувствительный
privilege – право, привилегия
malicious – злонамеренный
blame – возложить вину, обвинить
it’s worth – стóит
credentials – мандат, учётная запись с парамет-
рами доступа пользователя
account – 1. счёт, 2. учётная запись
amazing – удивительный
blank – пустой
complex – сложный
anniversary – годовщина
pick – выбирать
uppercase – заглавная (буква)
lowercase – строчная, маленькая (буква)
letter – буква
and so forth – и так далее
drawer – шкаф
hunt – охотиться
sticky note – наклейка
screen – экран, дисплей, монитор
dead – мёртвый
smart card – смарт-карта
retina – сетчатка
configure – настраивать
account – учётная запись; счёт
definition – определение
unequalled – непревзойдённый, бесконечный
negate – сделать бесполезным, свести на нет
permission – разрешение
malicious software – вредоносное приложение
bogus – фиктивный
subvert – обойти
track – след, отслеживать
hire – нанимать
occupy – занимать
warrant – гарантировать
call – требовать
reference – рекомендации
previous – предыдущий
employer – работодатель
appropriate – зд. возможно
conscious – уделяющий много внимания; осоз-
нающий
background – анкетные данные, подноготная
across the board – ко всем без исключения
vet – проверять , проверять благонадёжность
honest – честный
sign in/ sign out sheet – лист учёта
implement – применять, осуществлять
two person rule – правило двух ответственных лиц
install – устанавливать
upgrade – обновлять
diversify – разграничить, разнообразить
management task – функция
Administrator account – учётная запись “Админи-
стратор”
rogue [rǝuɡ] – 1.мошенник, 2.неконтролируемый
write-only media – носитель, поддерживающий
только однократную запись
house – размещать
accountable – контролируемый
likely – вероятно
SMART = self monitoring analysis and reporting technology – технология самотестирования и проверки работоспособности жёстких дисков, система активного контроля за состоянием узлов диска, технология SMART
Exercises
I. Repeat the words after the teacher
appropriately, privileges, malicious, credentials, drawer, identify, significantly, strengthens, identity, retina, trustworthy, configure, associated, unequalled, virtually, conscious, employees, rogue, media, audit
II. Read and translate the information using the vocabulary
III. Translate the verbs, give the three forms
trump, establish, know, grant, deny, learn, concern, store, let, want, blame, protect, amaze, choose, mix, change, pick, lock, hunt, check, keep, consider, support, strengthen, install, configure, add, handle, require, negate, permit, subvert, cover, hire, occupy, warrant, pass, select, apply, vet, include, track, implement, upgrade, diversify, store
IV. Give Russian equivalents
weak password, trump security, logon process, grant or deny, as well as, as well, like your e-mail, more privileges, do something malicious, blame it on you, it’s worth protecting, your credentials, it’s amazing, blank password, uppercase letter, lowercase letter, and so forth, yellow sticky note, keep a secret, for instance, fingerprint and retina scanners, configure the operating system, user accounts, unequalled power, negate security measures, install malicious software, add bogus users, subvert protective measures, when hiring an administrator, pass a complete background check, across the board, unless they have been vetted, temporary employees, sign-in/sign-out sheets, implement a “two person” rule, upgrade software, to cover the tracks, audit data, the more … the less